C:\zotay\juje.pdb
Static task
static1
Behavioral task
behavioral1
Sample
647c849266b7155813e97b0c57ed0e2c3822d31aae534b21a831ef3b102cc54b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
647c849266b7155813e97b0c57ed0e2c3822d31aae534b21a831ef3b102cc54b.exe
Resource
win10v2004-20241007-en
General
-
Target
647c849266b7155813e97b0c57ed0e2c3822d31aae534b21a831ef3b102cc54b.exe
-
Size
408KB
-
MD5
245e483f4a790aaacce22cf5ccd4f37e
-
SHA1
51a539c1a5e5cf0d9f101d1b022757eb98805911
-
SHA256
647c849266b7155813e97b0c57ed0e2c3822d31aae534b21a831ef3b102cc54b
-
SHA512
39ae4632f2b4fd5a6daa2c5a0b7dcc83180d8b24cbd857a60fb86ae2b18e596e848721832f77a3484ccdf2caf8cee2e104c0917423b12c21186039eb5cb15d0e
-
SSDEEP
6144:5cRLKFOV4Tn9E/be17TPyS74IYiD0+04a/zIS3jJT:56SOmTn9obe17WSUjC0+0DzVV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 647c849266b7155813e97b0c57ed0e2c3822d31aae534b21a831ef3b102cc54b.exe
Files
-
647c849266b7155813e97b0c57ed0e2c3822d31aae534b21a831ef3b102cc54b.exe.exe windows:5 windows x86 arch:x86
25b97b20ea5f74ae1a1939bb76680477
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateHardLinkA
CallNamedPipeW
GetCommConfig
GetConsoleAliasesA
GetWindowsDirectoryA
FindResourceExA
GlobalAlloc
LoadLibraryW
CreateEventA
GetConsoleAliasExesLengthW
GetStringTypeExW
GetExitCodeProcess
lstrcpynW
EnumSystemCodePagesA
GetFileAttributesW
LocalReAlloc
WriteConsoleW
GetBinaryTypeA
MultiByteToWideChar
SetLastError
FindCloseChangeNotification
VirtualAlloc
GetFileType
WriteProfileSectionW
FreeEnvironmentStringsW
GetPrivateProfileSectionA
GetStringTypeW
EnumDateFormatsW
FindAtomW
DeleteTimerQueueTimer
GlobalAddAtomW
OpenFileMappingA
LCMapStringW
OpenJobObjectA
GetProcAddress
GetStartupInfoW
HeapAlloc
GetLastError
HeapFree
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
Sleep
HeapSize
ExitProcess
SetUnhandledExceptionFilter
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
RaiseException
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetModuleHandleA
LCMapStringA
WideCharToMultiByte
GetStringTypeA
GetLocaleInfoA
user32
NotifyWinEvent
LoadMenuW
GetMenuInfo
ValidateRect
ArrangeIconicWindows
gdi32
GetGlyphIndicesA
advapi32
MapGenericMask
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 192KB - Virtual size: 38.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 126KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ